In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers.
This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties.
Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion
"Sinopsis" puede pertenecer a otra edición de este libro.
“Pang and Tan have put together a sound and thorough discussion of query response authentication. The book is well organized and flows nicely... Their diagrams are easy to follow and appropriately placed. This is a good publication for researchers and teachers of database management and query techniques.” – Robert M. Lynch for ACM Computing Reviews
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 65,07 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: suffolkbooks, Center moriches, NY, Estados Unidos de America
paperback. Condición: Very Good. Fast Shipping - Safe and Secure 7 days a week! Nº de ref. del artículo: 3TWOWA001M6K
Cantidad disponible: 4 disponibles